Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
statistical testing
file
Performance Evaluation of Sensor Networks by Statistical Modeling and Euclidean Model Checking
Submitted by amyclay on Mon, 11/23/2015 - 6:01pm
DTMC estimation
iLTL
networks
Performance
performance evaluation
Probabilistic Model Checking
Reliability
statistical testing
TDoA
verification
wireless sensor
UIUC
biblio
Performance Evaluation of Sensor Networks by Statistical Modeling and Euclidean Model Checking
Submitted by amyclay on Mon, 11/23/2015 - 6:01pm
DTMC estimation
iLTL
networks
Performance
performance evaluation
Probabilistic Model Checking
Reliability
statistical testing
TDoA
verification
wireless sensor
UIUC
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
« first
‹ previous
1
2